Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How long the exploit should take? #5

Open
FoxieFlakey opened this issue Dec 6, 2021 · 5 comments
Open

How long the exploit should take? #5

FoxieFlakey opened this issue Dec 6, 2021 · 5 comments

Comments

@FoxieFlakey
Copy link

FoxieFlakey commented Dec 6, 2021

How long the exploit should take?

It never completes even i leave it 48 hours

~/exploit $ ./exploit
WARNING: linker: /data/data/com.termux/files/home/exploit/poc3: unsupported flags DT_FLAGS_1=0x8000001
spray_pipes: 0x780
spray done... 

its stuck here for very long time(also i ignore the linker warning its will disappear after stripping the binary)
htop report the exploit does doing processing (sometime its in interruptible sleep)

compile command: ~/Android/Sdk/ndk/23.1.7779620/toolchains/llvm/prebuilt/linux-x86_64/bin/aarch64-linux-android24-clang exploit.c -o exploit then i transfer the executable to my android phone

uname -a: Linux localhost 3.18.31-perf-g810e576 #1 SMP PREEMPT Mon Aug 10 11:41:32 CST 2020 aarch64 Android

Android 7.1.1 CHP1801

Also its exploit for CVE-2015-1805

@snorez
Copy link
Owner

snorez commented Dec 6, 2021

Oh,, this poc is very old...
I didn't test this on Android. However, you may rewrite the code and check the modprobe_path(This may not be available on Android): grep modprobe_path /proc/kallsyms cat /proc/sys/kernel/modprobe

Line 48

unsigned long target_addr = 0xffffffff81aa40e0;

@FoxieFlakey
Copy link
Author

ye not available grep modprobe_path /proc/kallsyms show 0 which is same for every kernel symbols

@FoxieFlakey
Copy link
Author

but if it where correct target_addr how long it should take for you

@snorez
Copy link
Owner

snorez commented Dec 7, 2021

30 seconds, I guess.

@FoxieFlakey
Copy link
Author

and access denied for cat /proc/sys/kernel/modprobe

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants